-
Notifications
You must be signed in to change notification settings - Fork 3
/
draft-ietf-grow-bgp-session-culling-05.txt
504 lines (327 loc) · 16.7 KB
/
draft-ietf-grow-bgp-session-culling-05.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
Global Routing Operations W. Hargrave
Internet-Draft LONAP
Intended status: Best Current Practice M. Griswold
Expires: April 1, 2018 20C
J. Snijders
NTT
N. Hilliard
INEX
September 28, 2017
Mitigating Negative Impact of Maintenance through BGP Session Culling
draft-ietf-grow-bgp-session-culling-05
Abstract
This document outlines an approach to mitigate negative impact on
networks resulting from maintenance activities. It includes guidance
for both IP networks and Internet Exchange Points (IXPs). The
approach is to ensure BGP-4 sessions affected by the maintenance are
forcefully torn down before the actual maintenance activities
commence.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 1, 2018.
Copyright Notice
Copyright (c) 2017 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
Hargrave, et al. Expires April 1, 2018 [Page 1]
Internet-Draft BGP Session Culling September 2017
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Requirements Language . . . . . . . . . . . . . . . . . . . . 3
3. BGP Session Culling . . . . . . . . . . . . . . . . . . . . . 3
3.1. Voluntary BGP Session Teardown Recommendations . . . . . 3
3.1.1. Maintenance Considerations . . . . . . . . . . . . . 4
3.2. Involuntary BGP Session Teardown Recommendations . . . . 4
3.2.1. Packet Filter Considerations . . . . . . . . . . . . 4
3.2.2. Hardware Considerations . . . . . . . . . . . . . . . 5
3.3. Procedural Considerations . . . . . . . . . . . . . . . . 6
4. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 6
5. Security Considerations . . . . . . . . . . . . . . . . . . . 6
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6
7. References . . . . . . . . . . . . . . . . . . . . . . . . . 6
7.1. Normative References . . . . . . . . . . . . . . . . . . 6
7.2. Informative References . . . . . . . . . . . . . . . . . 7
Appendix A. Example packet filters . . . . . . . . . . . . . . . 7
A.1. Cisco IOS, IOS XR & Arista EOS Firewall Example
Configuration . . . . . . . . . . . . . . . . . . . . . . 7
A.2. Nokia SR OS Filter Example Configuration . . . . . . . . 8
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8
1. Introduction
BGP Session Culling is the practice of ensuring BGP sessions are
forcefully torn down before maintenance activities on a lower layer
network commence, which otherwise would affect the flow of data
between the BGP speakers.
BGP Session Culling ensures that lower layer network maintenance
activities cause the minimum possible amount of disruption, by
causing BGP speakers to preemptively converge onto alternative paths
while the lower layer network's forwarding plane remains fully
operational.
The grace period required for a successful application of BGP Session
Culling is the sum of the time needed to detect the loss of the BGP
session, plus the time required for the BGP speaker to converge onto
alternative paths. The first value is often governed by the BGP Hold
Timer (section 6.5 of [RFC4271]), commonly between 90 and 180
Hargrave, et al. Expires April 1, 2018 [Page 2]
Internet-Draft BGP Session Culling September 2017
seconds. The second value is implementation specific, but could be
as much as 15 minutes when a router with a slow control-plane is
receiving a full set of Internet routes.
Throughout this document the "Caretaker" is defined to be in control
of the lower layer network, while "Operators" directly administrate
the BGP speakers. Operators and Caretakers implementing BGP Session
Culling are encouraged to avoid using a fixed grace period, but
instead monitor forwarding plane activity while the culling is taking
place and consider it complete once traffic levels have dropped to a
minimum (Section 3.3).
2. Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
3. BGP Session Culling
From the viewpoint of the Operator, there are two types of BGP
Session Culling:
Voluntary BGP Session Teardown: The Operator initiates the tear down
of the potentially affected BGP session by issuing an
Administrative Shutdown.
Involuntary BGP Session Teardown: The Caretaker of the lower layer
network disrupts (higher layer) BGP control-plane traffic, causing
the BGP Hold Timers of the affected BGP session to expire,
subsequently triggering rerouting of end user traffic.
3.1. Voluntary BGP Session Teardown Recommendations
Before an Operator commences activities which can cause disruption to
the flow of data through the lower layer network, an Operator can
reduce loss of traffic by issuing an administrative shutdown to all
BGP sessions running across the lower layer network and wait a few
minutes for data-plane traffic to subside.
While architectures exist to facilitate quick network reconvergence
(such as BGP PIC [I-D.ietf-rtgwg-bgp-pic]), an Operator cannot assume
the remote side has such capabilities. As such, a grace period
between the Administrative Shutdown and the impacting maintenance
activities is warranted.
Hargrave, et al. Expires April 1, 2018 [Page 3]
Internet-Draft BGP Session Culling September 2017
After the maintenance activities have concluded, the Operator is
expected to restore the BGP sessions to their original Administrative
state.
3.1.1. Maintenance Considerations
Initiators of the administrative shutdown MAY consider using Graceful
Shutdown [I-D.ietf-grow-bgp-gshut] to facilitate smooth drainage of
traffic prior to session tear down, and the Shutdown Communication
[RFC8203] to inform the remote side on the nature and duration of the
maintenance activities.
3.2. Involuntary BGP Session Teardown Recommendations
In the case where multilateral interconnection between BGP speakers
is facilitated through a switched layer-2 fabric, such as commonly
seen at Internet Exchange Points (IXPs), different operational
considerations can apply.
Operational experience shows many Operators are unable to carry out
the Voluntary BGP Session Teardown recommendations, because of the
operational cost and risk of coordinating the two configuration
changes required. This has an adverse affect on Internet
performance.
In the absence of notifications from the lower layer (e.g. Ethernet
link down) consistent with the planned maintenance activities in a
switched layer-2 fabric, the Caretaker of the fabric could choose to
cull BGP sessions on behalf of the Operators connected to the fabric.
Such culling of control-plane traffic will preempt the loss of end-
user traffic, by causing the expiration of BGP Hold Timers ahead of
the moment where the expiration would occur without intervention from
the fabric's Caretaker.
In this scenario, BGP Session Culling is accomplished as described in
the next sub-section, through the application of a combined layer-3
and layer-4 packet filter deployed in the Caretaker's switched
fabric.
3.2.1. Packet Filter Considerations
The peering LAN prefixes used by the IXP form the control plane, and
following considerations apply to the packet filter design:
o The packet filter MUST only affect BGP traffic specific to the
layer-2 fabric, i.e. forming part of the control plane of the
Hargrave, et al. Expires April 1, 2018 [Page 4]
Internet-Draft BGP Session Culling September 2017
system described, rather than multihop BGP traffic which merely
transits.
o The packet filter MUST only affect BGP, i.e. TCP/179.
o The packet filter SHOULD make provision for the bidirectional
nature of BGP, i.e. that sessions may be established in either
direction.
o The packet filter MUST affect all Address Family Identifiers.
Appendix A contains examples of correct packet filters for various
platforms.
3.2.2. Hardware Considerations
Not all hardware is capable of deploying Layer 3 / Layer 4 filters on
Layer 2 ports, and even on platforms which claim support for such a
feature, limitations may exist or hardware resource allocation
failures may occur during filter deployment which may cause
unexpected results. These problems may include:
o Platform inability to apply layer 3/4 filters on ports which
already have layer 2 filters applied.
o Layer 3/4 filters supported for IPv4 but not for IPv6.
o Layer 3/4 filters supported on physical ports, but not on 802.3ad
Link Aggregate ports.
o Failure of the Caretaker to apply filters to all 802.3ad Link
Aggregate ports.
o Limitations in ACL hardware mechanisms causing filters not to be
applied.
o Fragmentation of ACL lookup memory causing transient ACL
application problems which are resolved after ACL removal /
reapplication.
o Temporary service loss during hardware programming
o Reduction in hardware ACL capacity if the platform enables
lossless ACL application.
It is advisable for the Caretaker to be aware of the limitations of
their hardware, and to thoroughly test all complicated configurations
Hargrave, et al. Expires April 1, 2018 [Page 5]
Internet-Draft BGP Session Culling September 2017
in advance to ensure that problems don't occur during production
deployments.
3.3. Procedural Considerations
The Caretaker of the lower layer network can monitor data-plane
traffic (e.g. interface counters) and carry out the maintenance
without impact to traffic once session culling is complete.
It is recommended that the packet filters are only deployed for the
duration of the maintenance and immediately removed after the
maintenance. To prevent unnecessarily troubleshooting, it is
RECOMMENDED that Caretakers notify the affected Operators before the
maintenance takes place, and make it explicit that the Involuntary
BGP Session Culling methodology will be applied.
4. Acknowledgments
The authors would like to thank the following people for their
contributions to this document: Saku Ytti, Greg Hankins, James
Bensley, Wolfgang Tremmel, Daniel Roesen, Bruno Decraene, Tore
Anderson, John Heasley, Warren Kumari, Stig Venaas, and Brian
Carpenter.
5. Security Considerations
There are no security considerations.
6. IANA Considerations
This document has no actions for IANA.
7. References
7.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997, <https://www.rfc-
editor.org/info/rfc2119>.
[RFC4271] Rekhter, Y., Ed., Li, T., Ed., and S. Hares, Ed., "A
Border Gateway Protocol 4 (BGP-4)", RFC 4271,
DOI 10.17487/RFC4271, January 2006, <https://www.rfc-
editor.org/info/rfc4271>.
Hargrave, et al. Expires April 1, 2018 [Page 6]
Internet-Draft BGP Session Culling September 2017
7.2. Informative References
[I-D.ietf-grow-bgp-gshut]
Francois, P., Decraene, B., Pelsser, C., Patel, K., and C.
Filsfils, "Graceful BGP session shutdown", draft-ietf-
grow-bgp-gshut-11 (work in progress), September 2017.
[RFC8203] Snijders, J., Heitz, J., and J. Scudder, "BGP
Administrative Shutdown Communication", RFC 8203,
DOI 10.17487/RFC8203, July 2017, <https://www.rfc-
editor.org/info/rfc8203>.
[I-D.ietf-rtgwg-bgp-pic]
Bashandy, A., Filsfils, C., and P. Mohapatra, "BGP Prefix
Independent Convergence", draft-ietf-rtgwg-bgp-pic-05
(work in progress), May 2017.
Appendix A. Example packet filters
Example packet filters for "Involuntary BGP Session Teardown" at an
IXP using peering LAN prefixes 192.0.2.0/24 and 2001:db8:2::/64 as
its control plane.
A repository of configuration examples for a number of assorted
platforms can be found at https://github.com/bgp/bgp-session-culling-
config-examples .
A.1. Cisco IOS, IOS XR & Arista EOS Firewall Example Configuration
ipv6 access-list acl-ipv6-permit-all-except-bgp
10 deny tcp 2001:db8:2::/64 eq bgp 2001:db8:2::/64
20 deny tcp 2001:db8:2::/64 2001:db8:2::/64 eq bgp
30 permit ipv6 any any
!
ip access-list acl-ipv4-permit-all-except-bgp
10 deny tcp 192.0.2.0/24 eq bgp 192.0.2.0/24
20 deny tcp 192.0.2.0/24 192.0.2.0/24 eq bgp
30 permit ip any any
!
interface Ethernet33
description IXP Participant Affected by Maintenance
ip access-group acl-ipv4-permit-all-except-bgp in
ipv6 access-group acl-ipv6-permit-all-except-bgp in
!
Hargrave, et al. Expires April 1, 2018 [Page 7]
Internet-Draft BGP Session Culling September 2017
A.2. Nokia SR OS Filter Example Configuration
ip-filter 10 create
filter-name "ACL IPv4 Permit All Except BGP"
default-action forward
entry 10 create
match protocol tcp
dst-ip 192.0.2.0/24
src-ip 192.0.2.0/24
port eq 179
exit
action
drop
exit
exit
exit
ipv6-filter 10 create
filter-name "ACL IPv6 Permit All Except BGP"
default-action forward
entry 10 create
match next-header tcp
dst-ip 2001:db8:2::/64
src-ip 2001:db8:2::/64
port eq 179
exit
action
drop
exit
exit
exit
interface "port-1/1/1"
description "IXP Participant Affected by Maintenance"
ingress
filter ip 10
filter ipv6 10
exit
exit
Authors' Addresses
Hargrave, et al. Expires April 1, 2018 [Page 8]
Internet-Draft BGP Session Culling September 2017
Will Hargrave
LONAP Ltd
5 Fleet Place
London EC4M 7RD
United Kingdom
Email: [email protected]
Matt Griswold
20C
1658 Milwaukee Ave # 100-4506
Chicago, IL 60647
United States of America
Email: [email protected]
Job Snijders
NTT Communications
Theodorus Majofskistraat 100
Amsterdam 1065 SZ
The Netherlands
Email: [email protected]
Nick Hilliard
INEX
4027 Kingswood Road
Dublin 24
Ireland
Email: [email protected]
Hargrave, et al. Expires April 1, 2018 [Page 9]